Download SAT A Security Architecture Achieving Anonymity and Traceability in

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
1
SAT: A Security Architecture Achieving
Anonymity and Traceability in Wireless
Mesh Networks
Abstract:
Anonymity has received increasing attention in the literature due to the users’ awareness of
their privacy nowadays. Anonymity provides protection for users to enjoy network services
without being traced. While anonymity-related issues have been extensively studied in
payment-based systems such as e-cash and peer-to-peer (P2P) systems, little effort has been
devoted to wireless mesh networks (WMNs). On the other hand, the network authority
requires conditional anonymity such that misbehaving entities in the network remain
traceable. In this paper, we propose a security architecture to ensure unconditional
anonymity for honest users and traceability of misbehaving users for network authorities in
WMNs. The proposed architecture strives to resolve the conflicts between the anonymity
and traceability objectives, in addition to guaranteeing fundamental security requirements
including authentication, confidentiality, data integrity, and nonrepudiation. Thorough
analysis on security and efficiency is incorporated, demonstrating the feasibility and
effectiveness of the proposed architecture.
INTRODUCTION
ireless Mesh Network (WMN) is a promising technology and is expected to be
W widespread due to its low- investment feature and the wireless broadband services it
supports, attractive to both service providers and users. However, security issues inherent in
WMNs or any wireless networks need be considered before the deployment and
proliferation of these networks, since it is unappealing to subscribers to obtain services
without security and privacy guarantees. Wireless security has been the hot topic in the
literature for various network technologies such as cellular networks [1], wireless local area
networks (WLANs) [2], wireless sensor networks [3], [4], mobile ad hoc networks (MANETs)
[5], [6], and vehicular ad hoc networks (VANETs) [7]. Recently, new proposals on WMN
security [8], [9] have emerged. In [8], the authors describe the specifics of WMNs and
identify three fundamental network operations that need to be secured. We [9] propose an
attack-resilient security architecture (ARSA) for WMNs, addressing countermeasures to a
wide range of attacks in WMNs. Due to the fact that security in WMNs is still in its infancy
as very little
1.
J. Sun is with the Department of Electrical Engineering and Computer Science,
University of Tennessee, Knoxville, TN 37996.
E-mail: [email protected].
www.frontlinetechnologies.org
[email protected]
+91 7200247247
2
2.
C. Zhang and Y. Fang are with the Department of Electrical and Computer
Engineering, University of Florida, PO Box 116130, Gainesville, FL 32611. E-mail:
[email protected], [email protected].
3.
Y. Zhang is with the School of Electrical, Computer, and Energy Engineering,
Arizona State University, Tempe, AZ 85287.
E-mail: [email protected].
Manuscript received 4 Sept. 2008; revised 16 May 2009; accepted 7 Sept. 2009; published
online 4 Dec. 2009.
For information on obtaining reprints of this article, please send e-mail to:
[email protected], and reference IEEECS Log Number TDSC-2008-09-0140. Digital
Object Identifier no. 10.1109/TDSC.2009.50.
Architecture Diagram
CONCLUSION
In this paper, we propose SAT, a security architecture mainly consisting of the ticket-based
protocols, which resolves the conflicting security requirements of unconditional anonymity
for honest users and traceability of misbehaving users. By utilizing the tickets, self-
generated pseudonyms, and the hierarchical identity-based cryptography, the proposed
architecture is demonstrated to achieve desired security objectives and efficiency.
References:
1. European Telecomm. Standards Inst. (ETSI), "GSM 2.09: Security Aspects," June 1993.
2. P. Kyasanur and N.H. Vaidya, "Selfish MAC Layer Misbehavior in Wireless
Networks," IEEE Trans. Mobile Computing, vol. 4, no. 5, pp. 502-516, Sept. 2005.
3. A. Perrig, J. Stankovic, and D. Wagner, "Security in Wireless Sensor Networks,"
Comm. ACM, vol. 47, no. 6, pp. 53-57, 2004.
4. S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient Security Mechanisms for Large-Scale
Distributed Sensor Networks," ACM Trans. Sensor Networks, vol. 2, no. 4, pp. 500528, Nov. 2006.
5. W. Lou and Y. Fang, A Survey on Wireless Security in Mobile Ad Hoc Networks:
Challenges and Possible Solutions, X. Chen, X. Huang, and D.-Z. Du, eds., Kluwer
Academic Publishers/ Springer, 2004.
www.frontlinetechnologies.org
[email protected]
+91 7200247247
3
6. L. Zhou and Z.J. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13,
no. 6, pp. 24-30, Dec. 1999.
7. M. Raya and J-P. Hubaux, "Securing Vehicular Ad Hoc Networks," J. Computer
Security, special issue on security of ad hoc and sensor networks, vol. 15, no. 1, pp.
39-68, 2007.
8. N.B. Salem and J-P. Hubaux, "Securing Wireless Mesh Networks," IEEE Wireless
Comm., vol. 13, no. 2, pp. 50-55, Apr. 2006.
9. Y. Zhang and Y. Fang, "ARSA: An Attack-Resilient Security Architecture for Multihop
Wireless Mesh Networks," IEEE J. Selected Areas Comm., vol. 24, no. 10, pp. 19161928, Oct. 2006.
10. I.F. Akyildiz, X. Wang, and W. Wang, "Wireless Mesh Networks: A Survey,"
Computer Networks, vol. 47, no. 4, pp. 445-487, Mar. 2005.
www.frontlinetechnologies.org
[email protected]
+91 7200247247